-
1
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds of interaction
-
Proc Eighth ACM Symp Princ Distrib Comput
-
Bar-Ilan, J. and Beaver, D. (1989). Non-cryptographic faulttolerant computing in a constant number of rounds of interaction. In Rudnicki, P., editor, Proceedings of the eighth annual ACM Symposium on Principles of distributed computing, pages 201-209, New York. ACM Press. (Pubitemid 20692671)
-
(1989)
Proceedings of the Annual ACM Symposium on Principles of Distributed Computing
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
2
-
-
84898960610
-
Completeness theorems for noncryptographic faulttolerant distributed computations
-
ACM Press
-
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988). Completeness theorems for noncryptographic faulttolerant distributed computations. In 20th Annual ACM Symposium on Theory of Computing, pages 110. ACM Press.
-
(1988)
20th Annual ACM Symposium on Theory of Computing
, pp. 110
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
51849143985
-
Multi-party computation goes live
-
Bogetoft, P., Christensen, D., Dåmgard, I., Geisler, M., Jakobsen, T., Kreigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., Schwartzbach, M., and Toft, T. (2008). Multi-party computation goes live. Cryptology ePrint Archive, Report 2008/068.
-
(2008)
Cryptology EPrint Archive, Report 2008/068
-
-
Bogetoft, P.1
Christensen, D.2
Dåmgard, I.3
Geisler, M.4
Jakobsen, T.5
Kreigaard, M.6
Nielsen, J.7
Nielsen, J.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
4
-
-
47949096726
-
Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications
-
BRICS
-
Bogetoft, P., Damgård, I., Jakobsen, T., Nielsen, K., Pagter, J., and Toft, T. (2005). Secure computing, economy, and trust: A generic solution for secure auctions with real-world applications. BRICS Report Series RS-05-18,BRICS. http://www.brics.dk/RS/05/18/.
-
(2005)
BRICS Report Series RS-05-18
-
-
Bogetoft, P.1
Damgård, I.2
Jakobsen, T.3
Nielsen, K.4
Pagter, J.5
Toft, T.6
-
5
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Halevi, S. and Rabin, T., editors, Theory of Cryptography, Springer
-
Damgard, I., Fitzi, M., Kiltz, E., Nielsen, J., and Toft, T. (2006). Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Halevi, S. and Rabin, T., editors, Theory of Cryptography, volume 3876 of Lecture Notes in Computer Science (LNCS), pages 285-304. Springer.
-
(2006)
Lecture Notes in Computer Science (LNCS)
, vol.3876
, pp. 285-304
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
6
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires
-
Naccache, D., editor, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Germany
-
Fischlin, M. (2001). A cost-effective pay-per-multiplication comparison method for millionaires. In Naccache, D., editor, Topics in Cryptology - CT-RSA 2001, volume 2020 of Lecture Notes in Computer Science, pages 457-471. Springer-Verlag, Berlin, Germany.
-
(2001)
Topics in Cryptology - CT-RSA 2001
, vol.2020
, pp. 457-471
-
-
Fischlin, M.1
-
7
-
-
0031628398
-
Simplified vss and fast-track multiparty computations with applications to threshold cryptography
-
New York, NY, USA. ACM Press
-
Gennaro, R., Rabin, M., and Rabin, T. (1998). Simplified vss and fast-track multiparty computations with applications to threshold cryptography. In PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pages 101-111, New York, NY, USA. ACM Press.
-
(1998)
PODC '98: Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.2
Rabin, T.3
-
8
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany
-
Nishide, T. and Ohta, K. (2007). Multiparty computation for interval, equality, and comparison without bit-decomposition protocol. In PKC 2007 International Workshop on Theory and Practice in Public Key Cryptography, Lecture Notes in Computer Science. Springer-Verlag, Berlin, Germany.
-
(2007)
PKC 2007 International Workshop on Theory and Practice in Public Key Cryptography
-
-
Nishide, T.1
Ohta, K.2
-
9
-
-
74549222726
-
Secret sharing comparison by transformation and rotation
-
International Conference on Information Theoretic Security 2007
-
Reistad, T. and Toft, T. (2007). Secret sharing comparison by transformation and rotation. In Preproceedings ICITS, International Conference on Information Theoretic Security 2007
-
(2007)
Preproceedings ICITS
-
-
Reistad, T.1
Toft, T.2
-
10
-
-
35048828873
-
Practical twoparty computation based on the conditional gate
-
Lee, P. J., editor, Advances in Cryptology - ASIACRYPT 2004, Springer-Verlag, Berlin, Germany
-
Schoenmakers, B. and Tuyls, P. (2004). Practical twoparty computation based on the conditional gate. In Lee, P. J., editor, Advances in Cryptology - ASIACRYPT 2004, volume 3329 of Lecture Notes in Computer Science, pages 119-136. Springer-Verlag, Berlin, Germany.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
11
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11):612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|